Cargando…
Practical Three-Factor Authentication Protocol Based on Elliptic Curve Cryptography for Industrial Internet of Things
Because the majority of information in the industrial Internet of things (IIoT) is transmitted over an open and insecure channel, it is indispensable to design practical and secure authentication and key agreement protocols. Considering the weak computational power of sensors, many scholars have des...
Autores principales: | Zhao, Xingwen, Li, Dexin, Li, Hui |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9572988/ https://www.ncbi.nlm.nih.gov/pubmed/36236609 http://dx.doi.org/10.3390/s22197510 |
Ejemplares similares
-
Lightweight Authentication Mechanism for Industrial IoT Environment Combining Elliptic Curve Cryptography and Trusted Token
por: Yang, Yu-Sheng, et al.
Publicado: (2023) -
Elliptic curves in cryptography
por: Blake, I, et al.
Publicado: (1999) -
A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
por: Yeh, Hsiu-Lien, et al.
Publicado: (2011) -
Elliptic Curve Cryptography-Based Authentication with Identity Protection for Smart Grids
por: Zhang, Liping, et al.
Publicado: (2016) -
Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
por: Choi, Younsung, et al.
Publicado: (2014)